Cited By
View all- Hroub AElrabaa M(2022)SecSoC: A Secure System on Chip Architecture for IoT Devices2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST54066.2022.9839995(41-44)Online publication date: 27-Jun-2022
- Bal GSchmidt AKuntze N(2009)Injecting trust to cryptographic key managementProceedings of the 11th international conference on Advanced Communication Technology - Volume 210.5555/1701835.1701891(1197-1201)Online publication date: 15-Feb-2009
- Ramkumar M(2008)Trustworthy Computing under Resource Constraints with the DOWN PolicyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2007.702275:1(49-61)Online publication date: 1-Jan-2008
- Show More Cited By